default search action
Jain-Shing Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c14]Jain-Shing Wu, Chien-Chang Wu, Chien-Sen Liao:
Lactobacillus Fermentation Prediciton Using Convolution Nerual Network. ICCE-TW 2022: 19-20
2010 – 2019
- 2019
- [c13]Jain-Shing Wu, Ming-Shen Jian:
Smart Home Personalizing Services Based on Adaptive Cloud IoT Devices with Bigdata and Deep Learning Technique. ICCE-TW 2019: 1-2 - 2017
- [j5]An-Hsiou Tsai, Chungnan Lee, Jain-Shing Wu, Fu-Sheng Chang:
Novel wharf-based genetic algorithm for berth allocation planning. Soft Comput. 21(11): 2897-2910 (2017) - 2016
- [c12]Jain-Shing Wu, Xiangning Chen, Tian-Hsiang Huang:
Discovering the Hidden Connections between Genes and Proteins from the Undiscovered Public Literature. MISNC 2016: 46 - [c11]Jain-Shing Wu, Yuh-Jye Lee, Te-En Wei, Chih-Hung Hsieh, Chia-Min Lai:
ChainSpot: Mining Service Logs for Cyber Security Threat Detection. Trustcom/BigDataSE/ISPA 2016: 1867-1874 - 2015
- [j4]Jain-Shing Wu, Chih-Ta Lin, Yuh-Jye Lee, Song-Kong Chong:
Keystroke and Mouse Movement Profiling for Data Loss Prevention. J. Inf. Sci. Eng. 31(1): 23-42 (2015) - [c10]An-Hsiou Tsai, Chungnan Lee, Jain-Shing Wu, Fu-Sheng Chang:
A Novel Wharf-based Genetic Algorithm for Berth Allocation Planning. ASE BD&SI 2015: 46:1-46:9 - [c9]Chih-Hung Hsieh, Yu-Siang Shen, Chao-Wen Li, Jain-Shing Wu:
iF2: An Interpretable Fuzzy Rule Filter for Web Log Post-Compromised Malicious Activity Monitoring. AsiaJCIS 2015: 130-137 - [c8]Po-Cheng Huang, Jain-Shing Wu, Chungnan Lee:
Negative Emotion Event Detection for Chinese Posts on Facebook. CCBD 2015: 329-335 - [c7]Jain-Shing Wu, Wan-Ching Lin, Chih-Ta Lin, Te-En Wei:
Smartphone continuous authentication based on keystroke and gesture profiling. ICCST 2015: 191-197 - 2014
- [j3]Fu-Sheng Chang, Jain-Shing Wu, Chungnan Lee, Hung-Che Shen:
Greedy-search-based multi-objective genetic algorithm for emergency logistics scheduling. Expert Syst. Appl. 41(6): 2947-2956 (2014) - [c6]Pei-Chi Chen, Hahn-Ming Lee, Hsiao-Rong Tyan, Jain-Shing Wu, Te-En Wei:
Detecting Spam on Twitter via Message-Passing Based on Retweet-Relation. TAAI 2014: 56-65 - 2013
- [c5]Jain-Shing Wu, Yuh-Jye Lee, Song-Kong Chong, Chih-Ta Lin, Jung-Lun Hsu:
Key Stroke Profiling for Data Loss Prevention. TAAI 2013: 7-12 - 2011
- [c4]Te-En Wei, Zhi-Wei Chen, Chin-Wei Tien, Jain-Shing Wu, Hahn-Ming Lee, Albert B. Jeng:
RePEF - A system for Restoring Packed Executable File for malware analysis. ICMLC 2011: 519-527
2000 – 2009
- 2009
- [j2]Chuan-Kang Ting, Chungnan Lee, Hui-Chun Chang, Jain-Shing Wu:
Wireless Heterogeneous Transmitter Placement Using Multiobjective Variable-Length Genetic Algorithm. IEEE Trans. Syst. Man Cybern. Part B 39(4): 945-958 (2009) - [c3]Shih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo:
Holography: A Hardware Virtualization Tool for Malware Analysis. PRDC 2009: 263-268 - 2008
- [c2]Ming-Hour Yang, Jain-Shing Wu, Shih-Jen Chen:
Protect mobile RFID location privacy using dynamic identity. IEEE ICCI 2008: 366-374 - 2005
- [c1]Hong-Long Liang, Chungnan Lee, Jain-Shing Wu:
Multiplex PCR primer design for gene family using genetic algorithm. GECCO 2005: 67-74 - 2004
- [j1]Jain-Shing Wu, Chungnan Lee, Chien-Chang Wu, Yow-Ling Shiue:
Primer design using genetic algorithm. Bioinform. 20(11): 1710-1717 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint